{"id":44958,"date":"2022-01-24T09:06:37","date_gmt":"2022-01-24T09:06:37","guid":{"rendered":"http:\/\/c6bba79f-f374-49e6-8d2c-d5d5bb54cd83"},"modified":"2022-01-24T09:06:37","modified_gmt":"2022-01-24T09:06:37","slug":"hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/","title":{"rendered":"Hackers hijack smart contracts in cryptocurrency token &#8216;rug pull&#8217; exit scams"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" class=\"ff-og-image-inserted\"><\/div>\n<p>Hackers are abusing misconfigurations in smart contracts to launch token rug pulls, researchers say.&nbsp;<\/p>\n<p>Despite the current volatility in the cryptocurrency market, with prices for many popular coins including Bitcoin (BTC) plunging, interest in the crypto, token, and NFT spaces remains stable.&nbsp;<\/p>\n<p>2021 was a record-breaking year for cryptocurrency-related theft and fraud. Cybercriminals netted an estimated $14 billion in cryptocurrency and fraudulent schemes involving digital assets continue to evolve. <\/p>\n<p>On Monday, Check Point Research (CPR) said that scammers are now turning their attention <a href=\"https:\/\/research.checkpoint.com\/2022\/scammers-are-creating-new-fraudulent-crypto-tokens-and-misconfiguring-smart-contracts-to-steal-funds\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">to smart contracts<\/a>, with misconfigurations utilized to launch new crypto tokens &#8212; before an inevitable &#8220;rug pull&#8221; takes place.&nbsp; <\/p>\n<p>Rug pulls occur when developers of a crypto or virtual asset project manipulate a token&#8217;s perceived worth and then abandon the project \u2013 taking investor funds with them.&nbsp;<\/p>\n<p>A recent example is the <a href=\"https:\/\/www.zdnet.com\/article\/squid-game-cryptocurrency-creators-pull-the-rug-from-under-investors-steal-millions\/\" target=\"_blank\" rel=\"noopener\">SQUID token<\/a> which, at its peak, saw the token reach $2,850 in value. Once the developers rug pulled and prevented traders from selling, the coin crashed by over 99.99%, rendering it basically worthless while netting the developers millions of dollars.&nbsp; <\/p>\n<p>There are some indicators of a potential token scam, including 99% buy fees and mechanisms that prevent investors from reselling. According to the researchers, flaws in smart contract code and vulnerabilities can also be harnessed by external attackers to increase the risk of a project losing investor money.<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>Fraudsters employ a range of tactics to conduct a rug pull including the use of scam services to create smart contracts which are then issued a new token name and symbol before becoming public. The manipulation of functions to create hidden triggers to launch a rug pull may also be included.&nbsp;<\/p>\n<p>Social media networks are then used to hype up a token &#8212; and its perceived value &#8212; before an exit scam occurs. In addition, timelocks are not usually imposed.&nbsp; <\/p>\n<p>&#8220;Timelocks are mostly used to delay administrative actions and are generally considered a strong indicator that a project is legitimate,&#8221; the researchers noted.&nbsp; <\/p>\n<p>Buy and sell fees are a common technique for rug pulls. In a smart contract examined by CPR, the firm discovered both &#8220;approve&#8221; and &#8220;aprove&#8221; functions. The former was a legitimate, standard function for contract transactions, whereas &#8220;aprove&#8221; was hidden and designed to allow the developers to impose 99% fees after a project took off.&nbsp; <\/p>\n<p>&#8220;A legitimate token will not charge fees or will charge hardcoded values that can&#8217;t be adjusted by the developer,&#8221; CPR says.&nbsp; <\/p>\n<p>Another example of potential scam mechanisms is a hidden function that allows developers to create more coins or control who can sell tokens. In the source code of a basketball-themed smart contract, the team found a transfer function that prevented reselling by average traders &#8212; a similar element used by SQUID.&nbsp; <\/p>\n<p>A function found in a separate contract that allowed coin minting was exploited by an attacker after the contract&#8217;s private key was accidentally leaked online. A threat actor was able to use the key to fraudulently mint millions of virtual coins before withdrawing them. In the same contract, an error in emergency withdrawal functions was also exploited.&nbsp;<\/p>\n<p>Attackers may also burn tokens to ramp up the price of existing pools. A failure to limit external burns in the <a href=\"https:\/\/halborn.com\/explained-the-zenon-network-hack-november-2021\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Zenon Network<\/a> was exploited in 2021, leading to a pool drain and the theft of over $814,000 from the project.&nbsp; <\/p>\n<p>&#8220;It&#8217;s hard to ignore the appeal of crypto,&#8221; CPR says. &#8220;It&#8217;s a shiny new thing that promises to change the world, and if prices continue on their upward trajectory, people have an opportunity to win a significant amount of money. However, cryptocurrency is a volatile market. Scammers will always find new ways to steal your money using cryptocurrency.&#8221; <\/p>\n<h3> Previous and related coverage <\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hackers-hijack-smart-contracts-in-new-cryptocurrency-token-rug-pull-scams\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Misconfiguration provides the perfect opportunity for token-based theft.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44958","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers hijack smart contracts in cryptocurrency token &#039;rug pull&#039; exit scams 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers hijack smart contracts in cryptocurrency token &#039;rug pull&#039; exit scams 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-24T09:06:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers hijack smart contracts in cryptocurrency token &#8216;rug pull&#8217; exit scams\",\"datePublished\":\"2022-01-24T09:06:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/2271ef902266baeee69e832e2e10f13be07ab0bb\\\/2019\\\/01\\\/23\\\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\\\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/\",\"name\":\"Hackers hijack smart contracts in cryptocurrency token 'rug pull' exit scams 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/2271ef902266baeee69e832e2e10f13be07ab0bb\\\/2019\\\/01\\\/23\\\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\\\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"datePublished\":\"2022-01-24T09:06:37+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/2271ef902266baeee69e832e2e10f13be07ab0bb\\\/2019\\\/01\\\/23\\\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\\\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/2271ef902266baeee69e832e2e10f13be07ab0bb\\\/2019\\\/01\\\/23\\\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\\\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers hijack smart contracts in cryptocurrency token &#8216;rug pull&#8217; exit scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers hijack smart contracts in cryptocurrency token 'rug pull' exit scams 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/","og_locale":"en_US","og_type":"article","og_title":"Hackers hijack smart contracts in cryptocurrency token 'rug pull' exit scams 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-24T09:06:37+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers hijack smart contracts in cryptocurrency token &#8216;rug pull&#8217; exit scams","datePublished":"2022-01-24T09:06:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/"},"wordCount":652,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/","name":"Hackers hijack smart contracts in cryptocurrency token 'rug pull' exit scams 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","datePublished":"2022-01-24T09:06:37+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/2271ef902266baeee69e832e2e10f13be07ab0bb\/2019\/01\/23\/ea1e5dd9-47ff-4ef1-bdc1-4cc05b9b1126\/istock-cryptocurrency-coins.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-hijack-smart-contracts-in-cryptocurrency-token-rug-pull-exit-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers hijack smart contracts in cryptocurrency token &#8216;rug pull&#8217; exit scams"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44958"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}